Free PECB Lead-Cybersecurity-Manager Exam Actual Questions

The questions for Lead-Cybersecurity-Manager were last updated On Sep 14, 2024

Question No. 1

Why is proper maintenance of documented information important in a cybersecurity program?

Show Answer Hide Answer
Correct Answer: B

Proper maintenance of documented information in a cybersecurity program is important because it ensures that actors are ready to act when needed. Up-to-date documentation provides clear guidelines and procedures for handling incidents, implementing security measures, and maintaining compliance with policies. This readiness is critical for effective and timely response to cybersecurity threats. Reference include ISO/IEC 27001, which emphasizes the importance of maintaining accurate and current documentation for effective information security management.


Question No. 2

Which of the following activities does not ensure the ongoing security of an Intrusion Detection System (IDS)?

Show Answer Hide Answer
Correct Answer: C

Reporting IDS alerts of malicious transactions to interested parties does not ensure the ongoing security of an Intrusion Detection System (IDS). While it is important for situational awareness and incident response, it does not directly contribute to the security and maintenance of the IDS itself. Ensuring ongoing security of an IDS involves activities such as encrypting IDS management communications and creating unique user and administrator accounts for every IDS system, which help protect the IDS from being compromised. Reference include NIST SP 800-94, which provides guidelines for securing IDS systems.

Top of Form

Bottom of Form


Question No. 3

Which of the following best describes the primary focus of ISO/IEC 27032?

Show Answer Hide Answer
Correct Answer: D

ISO/IEC 27032 specifically focuses on cybersecurity, providing guidelines for improving the state of cybersecurity by addressing the protection of information systems and the broader internet ecosystem.


Question No. 4

What is a key objective of the ISO/IEC 27032 standard?

Show Answer Hide Answer
Correct Answer: B

The ISO/IEC 27032 standard aims to provide guidelines and best practices for protecting information systems and cyberspace from cyber threats, enhancing overall cybersecurity.


Question No. 5

Which of the following is NOT a component of the ISO/IEC 27032 framework?

Show Answer Hide Answer
Correct Answer: B

ISO/IEC 27032 focuses on cybersecurity aspects such as cyber incident management, cybersecurity controls and best practices, and stakeholder cooperation. It does not cover business strategy formulation, which is outside its scope.